Skip to main content

rmcp_server_kit/
auth.rs

1//! Authentication middleware for MCP servers.
2//!
3//! Supports multiple authentication methods tried in priority order:
4//! 1. mTLS client certificate (if configured and peer cert present)
5//! 2. Bearer token (API key) with Argon2id hash verification
6//!
7//! Includes per-source-IP rate limiting on authentication attempts.
8
9use std::{
10    collections::HashSet,
11    net::{IpAddr, SocketAddr},
12    num::NonZeroU32,
13    path::PathBuf,
14    sync::{
15        Arc, LazyLock, Mutex,
16        atomic::{AtomicU64, Ordering},
17    },
18    time::Duration,
19};
20
21use arc_swap::ArcSwap;
22use argon2::{Argon2, PasswordHash, PasswordHasher, PasswordVerifier, password_hash::SaltString};
23use axum::{
24    body::Body,
25    extract::ConnectInfo,
26    http::{Request, header},
27    middleware::Next,
28    response::{IntoResponse, Response},
29};
30use base64::{Engine as _, engine::general_purpose::URL_SAFE_NO_PAD};
31use secrecy::SecretString;
32use serde::Deserialize;
33use x509_parser::prelude::*;
34
35use crate::{bounded_limiter::BoundedKeyedLimiter, error::McpxError};
36
37/// Identity of an authenticated caller.
38///
39/// The [`Debug`] impl is **manually written** to redact the raw bearer token
40/// and the JWT `sub` claim. This prevents accidental disclosure if an
41/// `AuthIdentity` is ever logged via `tracing::debug!(?identity, …)` or
42/// `format!("{identity:?}")`. Only `name`, `role`, and `method` are printed
43/// in the clear; `raw_token` and `sub` are rendered as `<redacted>` /
44/// `<present>` / `<none>` markers.
45#[derive(Clone)]
46#[non_exhaustive]
47pub struct AuthIdentity {
48    /// Human-readable identity name (e.g. API key label or cert CN).
49    pub name: String,
50    /// RBAC role associated with this identity.
51    pub role: String,
52    /// Which authentication mechanism produced this identity.
53    pub method: AuthMethod,
54    /// Raw bearer token from the `Authorization` header, wrapped in
55    /// [`SecretString`] so it is never accidentally logged or serialized.
56    /// Present for OAuth JWT; `None` for mTLS and API-key auth.
57    /// Tool handlers use this for downstream token passthrough via
58    /// [`crate::rbac::current_token`].
59    pub raw_token: Option<SecretString>,
60    /// JWT `sub` claim (stable user identifier, e.g. Keycloak UUID).
61    /// Used for token store keying. `None` for non-JWT auth.
62    pub sub: Option<String>,
63}
64
65impl std::fmt::Debug for AuthIdentity {
66    /// Redacts `raw_token` and `sub` to prevent secret leakage via
67    /// `format!("{:?}")` or `tracing::debug!(?identity)`.
68    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
69        f.debug_struct("AuthIdentity")
70            .field("name", &self.name)
71            .field("role", &self.role)
72            .field("method", &self.method)
73            .field(
74                "raw_token",
75                &if self.raw_token.is_some() {
76                    "<redacted>"
77                } else {
78                    "<none>"
79                },
80            )
81            .field(
82                "sub",
83                &if self.sub.is_some() {
84                    "<redacted>"
85                } else {
86                    "<none>"
87                },
88            )
89            .finish()
90    }
91}
92
93/// How the caller authenticated.
94#[derive(Debug, Clone, Copy, PartialEq, Eq)]
95#[non_exhaustive]
96pub enum AuthMethod {
97    /// Bearer API key (Argon2id-hashed, configured statically).
98    BearerToken,
99    /// Mutual TLS client certificate.
100    MtlsCertificate,
101    /// OAuth 2.1 JWT bearer token (validated via JWKS).
102    OAuthJwt,
103}
104
105#[derive(Debug, Clone, Copy, PartialEq, Eq)]
106enum AuthFailureClass {
107    MissingCredential,
108    InvalidCredential,
109    #[cfg_attr(not(feature = "oauth"), allow(dead_code))]
110    ExpiredCredential,
111    /// Source IP exceeded the post-failure backoff limit.
112    RateLimited,
113    /// Source IP exceeded the pre-auth abuse gate (rejected before any
114    /// password-hash work — see [`AuthState::pre_auth_limiter`]).
115    PreAuthGate,
116}
117
118impl AuthFailureClass {
119    fn as_str(self) -> &'static str {
120        match self {
121            Self::MissingCredential => "missing_credential",
122            Self::InvalidCredential => "invalid_credential",
123            Self::ExpiredCredential => "expired_credential",
124            Self::RateLimited => "rate_limited",
125            Self::PreAuthGate => "pre_auth_gate",
126        }
127    }
128
129    fn bearer_error(self) -> (&'static str, &'static str) {
130        match self {
131            Self::MissingCredential => (
132                "invalid_request",
133                "missing bearer token or mTLS client certificate",
134            ),
135            Self::InvalidCredential => ("invalid_token", "token is invalid"),
136            Self::ExpiredCredential => ("invalid_token", "token is expired"),
137            Self::RateLimited => ("invalid_request", "too many failed authentication attempts"),
138            Self::PreAuthGate => (
139                "invalid_request",
140                "too many unauthenticated requests from this source",
141            ),
142        }
143    }
144
145    fn response_body(self) -> &'static str {
146        match self {
147            Self::MissingCredential => "unauthorized: missing credential",
148            Self::InvalidCredential => "unauthorized: invalid credential",
149            Self::ExpiredCredential => "unauthorized: expired credential",
150            Self::RateLimited => "rate limited",
151            Self::PreAuthGate => "rate limited (pre-auth)",
152        }
153    }
154}
155
156/// Snapshot of authentication success/failure counters.
157#[derive(Debug, Clone, Copy, PartialEq, Eq, serde::Serialize)]
158#[non_exhaustive]
159pub struct AuthCountersSnapshot {
160    /// Successful mTLS authentications.
161    pub success_mtls: u64,
162    /// Successful bearer-token authentications.
163    pub success_bearer: u64,
164    /// Successful OAuth JWT authentications.
165    pub success_oauth_jwt: u64,
166    /// Failures because no credential was presented.
167    pub failure_missing_credential: u64,
168    /// Failures because the credential was malformed or wrong.
169    pub failure_invalid_credential: u64,
170    /// Failures because the credential had expired.
171    pub failure_expired_credential: u64,
172    /// Failures because the source IP was rate-limited (post-failure backoff).
173    pub failure_rate_limited: u64,
174    /// Failures because the source IP exceeded the pre-auth abuse gate.
175    /// These never reach the password-hash verification path.
176    pub failure_pre_auth_gate: u64,
177}
178
179/// Internal atomic counters backing [`AuthCountersSnapshot`].
180#[derive(Debug, Default)]
181pub(crate) struct AuthCounters {
182    success_mtls: AtomicU64,
183    success_bearer: AtomicU64,
184    success_oauth_jwt: AtomicU64,
185    failure_missing_credential: AtomicU64,
186    failure_invalid_credential: AtomicU64,
187    failure_expired_credential: AtomicU64,
188    failure_rate_limited: AtomicU64,
189    failure_pre_auth_gate: AtomicU64,
190}
191
192impl AuthCounters {
193    fn record_success(&self, method: AuthMethod) {
194        match method {
195            AuthMethod::MtlsCertificate => {
196                self.success_mtls.fetch_add(1, Ordering::Relaxed);
197            }
198            AuthMethod::BearerToken => {
199                self.success_bearer.fetch_add(1, Ordering::Relaxed);
200            }
201            AuthMethod::OAuthJwt => {
202                self.success_oauth_jwt.fetch_add(1, Ordering::Relaxed);
203            }
204        }
205    }
206
207    fn record_failure(&self, class: AuthFailureClass) {
208        match class {
209            AuthFailureClass::MissingCredential => {
210                self.failure_missing_credential
211                    .fetch_add(1, Ordering::Relaxed);
212            }
213            AuthFailureClass::InvalidCredential => {
214                self.failure_invalid_credential
215                    .fetch_add(1, Ordering::Relaxed);
216            }
217            AuthFailureClass::ExpiredCredential => {
218                self.failure_expired_credential
219                    .fetch_add(1, Ordering::Relaxed);
220            }
221            AuthFailureClass::RateLimited => {
222                self.failure_rate_limited.fetch_add(1, Ordering::Relaxed);
223            }
224            AuthFailureClass::PreAuthGate => {
225                self.failure_pre_auth_gate.fetch_add(1, Ordering::Relaxed);
226            }
227        }
228    }
229
230    fn snapshot(&self) -> AuthCountersSnapshot {
231        AuthCountersSnapshot {
232            success_mtls: self.success_mtls.load(Ordering::Relaxed),
233            success_bearer: self.success_bearer.load(Ordering::Relaxed),
234            success_oauth_jwt: self.success_oauth_jwt.load(Ordering::Relaxed),
235            failure_missing_credential: self.failure_missing_credential.load(Ordering::Relaxed),
236            failure_invalid_credential: self.failure_invalid_credential.load(Ordering::Relaxed),
237            failure_expired_credential: self.failure_expired_credential.load(Ordering::Relaxed),
238            failure_rate_limited: self.failure_rate_limited.load(Ordering::Relaxed),
239            failure_pre_auth_gate: self.failure_pre_auth_gate.load(Ordering::Relaxed),
240        }
241    }
242}
243
244/// RFC 3339 timestamp, parsed at deserialization time.
245///
246/// Use this for any public field that needs to carry an RFC 3339 timestamp from
247/// TOML/JSON config or builder APIs. Construction is fallible (`parse`); once
248/// constructed the value is guaranteed to be a real RFC 3339 timestamp with a
249/// known offset, so downstream code does not need to handle parse errors.
250///
251/// Wraps [`chrono::DateTime<chrono::FixedOffset>`]; the underlying value is
252/// available via [`Self::as_datetime`] or [`Self::into_inner`]. `Serialize`
253/// emits the canonical RFC 3339 form via [`chrono::DateTime::to_rfc3339`], so
254/// the on-the-wire format for `ApiKeySummary` (admin endpoints) is unchanged.
255#[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)]
256#[non_exhaustive]
257pub struct RfcTimestamp(chrono::DateTime<chrono::FixedOffset>);
258
259impl RfcTimestamp {
260    /// Parse an RFC 3339 timestamp.
261    ///
262    /// # Errors
263    ///
264    /// Returns the underlying [`chrono::ParseError`] when `s` is not a valid
265    /// RFC 3339 timestamp (e.g. missing the `T` separator, missing the offset
266    /// suffix, or out-of-range fields).
267    pub fn parse(s: &str) -> Result<Self, chrono::ParseError> {
268        chrono::DateTime::parse_from_rfc3339(s).map(Self)
269    }
270
271    /// Borrow the underlying [`chrono::DateTime`].
272    #[must_use]
273    pub fn as_datetime(&self) -> &chrono::DateTime<chrono::FixedOffset> {
274        &self.0
275    }
276
277    /// Consume the wrapper and return the underlying [`chrono::DateTime`].
278    #[must_use]
279    pub fn into_inner(self) -> chrono::DateTime<chrono::FixedOffset> {
280        self.0
281    }
282}
283
284impl std::fmt::Display for RfcTimestamp {
285    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
286        // Canonical RFC 3339 form; matches the deserialization input contract.
287        write!(f, "{}", self.0.to_rfc3339())
288    }
289}
290
291impl std::fmt::Debug for RfcTimestamp {
292    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
293        // Render as the canonical RFC 3339 string (not chrono's internal
294        // debug form) so existing `ApiKeyEntry` Debug-redaction tests --
295        // which look for the literal `"2030-01-01T00:00:00Z"` form in the
296        // formatted output -- continue to hold without bespoke handling.
297        write!(f, "{}", self.0.to_rfc3339())
298    }
299}
300
301impl<'de> Deserialize<'de> for RfcTimestamp {
302    fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
303    where
304        D: serde::Deserializer<'de>,
305    {
306        // Validate at deserialization time: a malformed `expires_at` in
307        // TOML or JSON aborts config load with a clear serde error rather
308        // than silently producing a key that fails open at runtime.
309        let s = String::deserialize(deserializer)?;
310        Self::parse(&s).map_err(serde::de::Error::custom)
311    }
312}
313
314impl serde::Serialize for RfcTimestamp {
315    fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
316    where
317        S: serde::Serializer,
318    {
319        serializer.serialize_str(&self.0.to_rfc3339())
320    }
321}
322
323impl From<chrono::DateTime<chrono::FixedOffset>> for RfcTimestamp {
324    fn from(value: chrono::DateTime<chrono::FixedOffset>) -> Self {
325        Self(value)
326    }
327}
328
329/// A single API key entry (stored as Argon2id hash in config).
330///
331/// The [`Debug`] impl is **manually written** to redact the Argon2id hash.
332/// Although the hash is not directly reversible, treating it as a secret
333/// prevents offline brute-force attempts from leaked logs and matches the
334/// defense-in-depth posture used for [`AuthIdentity`].
335#[derive(Clone, Deserialize)]
336#[non_exhaustive]
337pub struct ApiKeyEntry {
338    /// Human-readable key label (used in logs and audit records).
339    pub name: String,
340    /// Argon2id hash of the token (PHC string format).
341    pub hash: String,
342    /// RBAC role granted when this key authenticates successfully.
343    pub role: String,
344    /// Optional expiry, parsed from an RFC 3339 string at deserialization
345    /// time. Construction from a raw string is fallible (see
346    /// [`RfcTimestamp::parse`] and [`ApiKeyEntry::try_with_expiry`]),
347    /// which guarantees `verify_bearer_token` never sees a malformed value.
348    pub expires_at: Option<RfcTimestamp>,
349}
350
351impl std::fmt::Debug for ApiKeyEntry {
352    /// Redacts the Argon2id `hash` to keep it out of logs, panic backtraces,
353    /// and admin-endpoint responses that might `format!("{:?}", …)` an entry.
354    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
355        f.debug_struct("ApiKeyEntry")
356            .field("name", &self.name)
357            .field("hash", &"<redacted>")
358            .field("role", &self.role)
359            .field("expires_at", &self.expires_at)
360            .finish()
361    }
362}
363
364impl ApiKeyEntry {
365    /// Create a new API key entry (no expiry).
366    #[must_use]
367    pub fn new(name: impl Into<String>, hash: impl Into<String>, role: impl Into<String>) -> Self {
368        Self {
369            name: name.into(),
370            hash: hash.into(),
371            role: role.into(),
372            expires_at: None,
373        }
374    }
375
376    /// Set an RFC 3339 expiry on this key.
377    ///
378    /// Takes an already-parsed [`RfcTimestamp`]; for ergonomic construction
379    /// from a raw string see [`Self::try_with_expiry`].
380    #[must_use]
381    pub fn with_expiry(mut self, expires_at: RfcTimestamp) -> Self {
382        self.expires_at = Some(expires_at);
383        self
384    }
385
386    /// Set an RFC 3339 expiry on this key from a raw string.
387    ///
388    /// # Errors
389    ///
390    /// Returns the underlying [`chrono::ParseError`] when `expires_at` is
391    /// not a valid RFC 3339 timestamp. This is the fallible counterpart to
392    /// [`Self::with_expiry`].
393    pub fn try_with_expiry(
394        mut self,
395        expires_at: impl AsRef<str>,
396    ) -> Result<Self, chrono::ParseError> {
397        self.expires_at = Some(RfcTimestamp::parse(expires_at.as_ref())?);
398        Ok(self)
399    }
400}
401
402/// mTLS client certificate authentication configuration.
403#[derive(Debug, Clone, Deserialize)]
404#[allow(
405    clippy::struct_excessive_bools,
406    reason = "mTLS CRL behavior is intentionally configured as independent booleans"
407)]
408#[non_exhaustive]
409pub struct MtlsConfig {
410    /// Path to CA certificate(s) for verifying client certs (PEM format).
411    pub ca_cert_path: PathBuf,
412    /// If true, clients MUST present a valid certificate.
413    /// If false, client certs are optional (verified if presented).
414    #[serde(default)]
415    pub required: bool,
416    /// Default RBAC role for mTLS-authenticated clients.
417    /// The client cert CN becomes the identity name.
418    #[serde(default = "default_mtls_role")]
419    pub default_role: String,
420    /// Enable CRL-based certificate revocation checks using CDP URLs from the
421    /// configured CA chain and connecting client certificates.
422    #[serde(default = "default_true")]
423    pub crl_enabled: bool,
424    /// Optional fixed refresh interval for known CRLs. When omitted, refresh
425    /// cadence is derived from `nextUpdate` and clamped internally.
426    #[serde(default, with = "humantime_serde::option")]
427    pub crl_refresh_interval: Option<Duration>,
428    /// Timeout for individual CRL fetches.
429    #[serde(default = "default_crl_fetch_timeout", with = "humantime_serde")]
430    pub crl_fetch_timeout: Duration,
431    /// Grace window during which stale CRLs may still be used when refresh
432    /// attempts fail.
433    #[serde(default = "default_crl_stale_grace", with = "humantime_serde")]
434    pub crl_stale_grace: Duration,
435    /// When true, missing or unavailable CRLs cause revocation checks to fail
436    /// closed.
437    #[serde(default)]
438    pub crl_deny_on_unavailable: bool,
439    /// When true, apply revocation checks only to the end-entity certificate.
440    #[serde(default)]
441    pub crl_end_entity_only: bool,
442    /// Allow HTTP CRL distribution-point URLs in addition to HTTPS.
443    ///
444    /// Defaults to `true` because RFC 5280 §4.2.1.13 designates HTTP (and
445    /// LDAP) as the canonical transport for CRL distribution points.
446    /// SSRF defense for HTTP CDPs is provided by the IP-allowlist guard
447    /// (private/loopback/link-local/multicast/cloud-metadata addresses are
448    /// always rejected), redirect=none, body-size cap, and per-host
449    /// concurrency limit -- not by forcing HTTPS.
450    #[serde(default = "default_true")]
451    pub crl_allow_http: bool,
452    /// Enforce CRL expiration during certificate validation.
453    #[serde(default = "default_true")]
454    pub crl_enforce_expiration: bool,
455    /// Maximum concurrent CRL fetches across all hosts. Defense in depth
456    /// against SSRF amplification: even if many CDPs are discovered, no
457    /// more than this many fetches run in parallel. Per-host concurrency
458    /// is independently capped at 1 regardless of this value.
459    /// Default: `4`.
460    #[serde(default = "default_crl_max_concurrent_fetches")]
461    pub crl_max_concurrent_fetches: usize,
462    /// Hard cap on each CRL response body in bytes. Fetches exceeding this
463    /// are aborted mid-stream to bound memory and prevent gzip-bomb-style
464    /// amplification. Default: 5 MiB (`5 * 1024 * 1024`).
465    #[serde(default = "default_crl_max_response_bytes")]
466    pub crl_max_response_bytes: u64,
467    /// Global CDP discovery rate limit, in URLs per minute. Throttles
468    /// how many *new* CDP URLs the verifier may admit into the fetch
469    /// pipeline across the whole process, bounding asymmetric `DoS`
470    /// amplification when attacker-controlled certificates carry large
471    /// CDP lists. The limit is global (not per-source-IP) in this
472    /// release; per-IP scoping is deferred to a future version because
473    /// it requires plumbing the peer `SocketAddr` through the verifier
474    /// hook. URLs that lose the rate-limiter race are *not* marked as
475    /// seen, so subsequent handshakes observing the same URL can
476    /// retry admission.
477    /// Default: `60`.
478    #[serde(default = "default_crl_discovery_rate_per_min")]
479    pub crl_discovery_rate_per_min: u32,
480    /// Maximum number of distinct hosts that may hold a CRL fetch
481    /// semaphore at any time. Requests that would grow the map beyond
482    /// this cap return [`McpxError::Config`] containing the literal
483    /// substring `"crl_host_semaphore_cap_exceeded"`. Bounds memory
484    /// growth from attacker-controlled CDP URLs pointing at unique
485    /// hostnames. Default: 1024.
486    #[serde(default = "default_crl_max_host_semaphores")]
487    pub crl_max_host_semaphores: usize,
488    /// Maximum number of distinct URLs tracked in the "seen" set.
489    /// Beyond this, additional discovered URLs are silently dropped
490    /// with a rate-limited warn! log; no error surfaces. Default: 4096.
491    #[serde(default = "default_crl_max_seen_urls")]
492    pub crl_max_seen_urls: usize,
493    /// Maximum number of cached CRL entries. Beyond this, new
494    /// successful fetches are silently dropped with a rate-limited
495    /// warn! log (newest-rejected, not LRU-evicted). Default: 1024.
496    #[serde(default = "default_crl_max_cache_entries")]
497    pub crl_max_cache_entries: usize,
498}
499
500fn default_mtls_role() -> String {
501    "viewer".into()
502}
503
504const fn default_true() -> bool {
505    true
506}
507
508const fn default_crl_fetch_timeout() -> Duration {
509    Duration::from_secs(30)
510}
511
512const fn default_crl_stale_grace() -> Duration {
513    Duration::from_hours(24)
514}
515
516const fn default_crl_max_concurrent_fetches() -> usize {
517    4
518}
519
520const fn default_crl_max_response_bytes() -> u64 {
521    5 * 1024 * 1024
522}
523
524const fn default_crl_discovery_rate_per_min() -> u32 {
525    60
526}
527
528const fn default_crl_max_host_semaphores() -> usize {
529    1024
530}
531
532const fn default_crl_max_seen_urls() -> usize {
533    4096
534}
535
536const fn default_crl_max_cache_entries() -> usize {
537    1024
538}
539
540/// Rate limiting configuration for authentication attempts.
541///
542/// rmcp-server-kit uses two independent per-IP token-bucket limiters for auth:
543///
544/// 1. **Pre-auth abuse gate** ([`Self::pre_auth_max_per_minute`]): consulted
545///    *before* any password-hash work. Throttles unauthenticated traffic from
546///    a single source IP so an attacker cannot pin the CPU on Argon2id by
547///    spraying invalid bearer tokens. Sized generously (default = 10× the
548///    post-failure quota) so legitimate clients are unaffected. mTLS-
549///    authenticated connections bypass this gate entirely (the TLS handshake
550///    already performed expensive crypto with a verified peer).
551/// 2. **Post-failure backoff** ([`Self::max_attempts_per_minute`]): consulted
552///    *after* an authentication attempt fails. Provides explicit backpressure
553///    on bad credentials.
554#[derive(Debug, Clone, Deserialize)]
555#[non_exhaustive]
556pub struct RateLimitConfig {
557    /// Maximum failed authentication attempts per source IP per minute.
558    /// Successful authentications do not consume this budget.
559    #[serde(default = "default_max_attempts")]
560    pub max_attempts_per_minute: u32,
561    /// Maximum *unauthenticated* requests per source IP per minute admitted
562    /// to the password-hash verification path. When `None`, defaults to
563    /// `max_attempts_per_minute * 10` at limiter-construction time.
564    ///
565    /// Set higher than [`Self::max_attempts_per_minute`] so honest clients
566    /// retrying with the wrong key never trip this gate; its purpose is only
567    /// to bound CPU usage under spray attacks.
568    #[serde(default)]
569    pub pre_auth_max_per_minute: Option<u32>,
570    /// Hard cap on the number of distinct source IPs tracked per limiter.
571    /// When reached, idle entries are pruned first; if still full, the
572    /// oldest (LRU) entry is evicted to make room for the new one. This
573    /// bounds memory under IP-spray attacks. Default: `10_000`.
574    #[serde(default = "default_max_tracked_keys")]
575    pub max_tracked_keys: usize,
576    /// Per-IP entries idle for longer than this are eligible for
577    /// opportunistic pruning. Default: 15 minutes.
578    #[serde(default = "default_idle_eviction", with = "humantime_serde")]
579    pub idle_eviction: Duration,
580}
581
582impl Default for RateLimitConfig {
583    fn default() -> Self {
584        Self {
585            max_attempts_per_minute: default_max_attempts(),
586            pre_auth_max_per_minute: None,
587            max_tracked_keys: default_max_tracked_keys(),
588            idle_eviction: default_idle_eviction(),
589        }
590    }
591}
592
593impl RateLimitConfig {
594    /// Create a rate limit config with the given max failed attempts per minute.
595    /// Pre-auth gate defaults to `10x` this value at limiter-construction time.
596    /// Memory-bound defaults are `10_000` tracked keys with 15-minute idle eviction.
597    #[must_use]
598    pub fn new(max_attempts_per_minute: u32) -> Self {
599        Self {
600            max_attempts_per_minute,
601            ..Self::default()
602        }
603    }
604
605    /// Override the pre-auth abuse-gate quota (per source IP per minute).
606    /// When unset, defaults to `max_attempts_per_minute * 10`.
607    #[must_use]
608    pub fn with_pre_auth_max_per_minute(mut self, quota: u32) -> Self {
609        self.pre_auth_max_per_minute = Some(quota);
610        self
611    }
612
613    /// Override the per-limiter cap on tracked source-IP keys (default `10_000`).
614    #[must_use]
615    pub fn with_max_tracked_keys(mut self, max: usize) -> Self {
616        self.max_tracked_keys = max;
617        self
618    }
619
620    /// Override the idle-eviction window (default 15 minutes).
621    #[must_use]
622    pub fn with_idle_eviction(mut self, idle: Duration) -> Self {
623        self.idle_eviction = idle;
624        self
625    }
626}
627
628fn default_max_attempts() -> u32 {
629    30
630}
631
632fn default_max_tracked_keys() -> usize {
633    10_000
634}
635
636fn default_idle_eviction() -> Duration {
637    Duration::from_mins(15)
638}
639
640/// Authentication configuration.
641#[derive(Debug, Clone, Default, Deserialize)]
642#[non_exhaustive]
643pub struct AuthConfig {
644    /// Master switch - when false, all requests are allowed through.
645    #[serde(default)]
646    pub enabled: bool,
647    /// Bearer token API keys.
648    #[serde(default)]
649    pub api_keys: Vec<ApiKeyEntry>,
650    /// mTLS client certificate authentication.
651    pub mtls: Option<MtlsConfig>,
652    /// Rate limiting for auth attempts.
653    pub rate_limit: Option<RateLimitConfig>,
654    /// OAuth 2.1 JWT bearer token authentication.
655    #[cfg(feature = "oauth")]
656    pub oauth: Option<crate::oauth::OAuthConfig>,
657}
658
659impl AuthConfig {
660    /// Create an enabled auth config with the given API keys.
661    #[must_use]
662    pub fn with_keys(keys: Vec<ApiKeyEntry>) -> Self {
663        Self {
664            enabled: true,
665            api_keys: keys,
666            mtls: None,
667            rate_limit: None,
668            #[cfg(feature = "oauth")]
669            oauth: None,
670        }
671    }
672
673    /// Set rate limiting on this auth config.
674    #[must_use]
675    pub fn with_rate_limit(mut self, rate_limit: RateLimitConfig) -> Self {
676        self.rate_limit = Some(rate_limit);
677        self
678    }
679}
680
681/// Summary of a single API key suitable for admin endpoints.
682///
683/// Intentionally omits the Argon2id hash - only metadata is exposed.
684#[derive(Debug, Clone, serde::Serialize)]
685#[non_exhaustive]
686pub struct ApiKeySummary {
687    /// Human-readable key label.
688    pub name: String,
689    /// RBAC role granted when this key authenticates.
690    pub role: String,
691    /// Optional RFC 3339 expiry timestamp. Serialized as a canonical
692    /// RFC 3339 string so the admin-endpoint wire format is preserved.
693    pub expires_at: Option<RfcTimestamp>,
694}
695
696/// Snapshot of the enabled authentication methods for admin endpoints.
697#[derive(Debug, Clone, serde::Serialize)]
698#[allow(
699    clippy::struct_excessive_bools,
700    reason = "this is a flat summary of independent auth-method booleans"
701)]
702#[non_exhaustive]
703pub struct AuthConfigSummary {
704    /// Master enabled flag from config.
705    pub enabled: bool,
706    /// Whether API-key bearer auth is configured.
707    pub bearer: bool,
708    /// Whether mTLS client auth is configured.
709    pub mtls: bool,
710    /// Whether OAuth JWT validation is configured.
711    pub oauth: bool,
712    /// Current API-key list (no hashes).
713    pub api_keys: Vec<ApiKeySummary>,
714}
715
716impl AuthConfig {
717    /// Produce a hash-free summary of the auth config for admin endpoints.
718    #[must_use]
719    pub fn summary(&self) -> AuthConfigSummary {
720        AuthConfigSummary {
721            enabled: self.enabled,
722            bearer: !self.api_keys.is_empty(),
723            mtls: self.mtls.is_some(),
724            #[cfg(feature = "oauth")]
725            oauth: self.oauth.is_some(),
726            #[cfg(not(feature = "oauth"))]
727            oauth: false,
728            api_keys: self
729                .api_keys
730                .iter()
731                .map(|k| ApiKeySummary {
732                    name: k.name.clone(),
733                    role: k.role.clone(),
734                    expires_at: k.expires_at,
735                })
736                .collect(),
737        }
738    }
739}
740
741/// Keyed rate limiter type (per source IP). Memory-bounded by
742/// [`RateLimitConfig::max_tracked_keys`] to defend against IP-spray `DoS`.
743pub(crate) type KeyedLimiter = BoundedKeyedLimiter<IpAddr>;
744
745/// Connection info for TLS connections, carrying the peer socket address
746/// and (when mTLS is configured) the verified client identity extracted
747/// from the peer certificate during the TLS handshake.
748///
749/// Defined as a local type so we can implement axum's `Connected` trait
750/// for our custom `TlsListener` without orphan rule issues. The `identity`
751/// field travels with the connection itself (via the wrapping IO type),
752/// so there is no shared map to race against, no port-reuse aliasing, and
753/// no eviction policy to maintain.
754#[derive(Clone, Debug)]
755#[non_exhaustive]
756pub(crate) struct TlsConnInfo {
757    /// Remote peer socket address.
758    pub addr: SocketAddr,
759    /// Verified mTLS client identity, if a client certificate was presented
760    /// and successfully extracted during the TLS handshake.
761    pub identity: Option<AuthIdentity>,
762}
763
764impl TlsConnInfo {
765    /// Construct a new [`TlsConnInfo`].
766    #[must_use]
767    pub(crate) const fn new(addr: SocketAddr, identity: Option<AuthIdentity>) -> Self {
768        Self { addr, identity }
769    }
770}
771
772/// Shared state for the auth middleware.
773///
774/// `api_keys` uses [`ArcSwap`] so the SIGHUP handler can atomically
775/// swap in a new key list without blocking in-flight requests.
776#[allow(
777    missing_debug_implementations,
778    reason = "contains governor RateLimiter and JwksCache without Debug impls"
779)]
780#[non_exhaustive]
781pub(crate) struct AuthState {
782    /// Active set of API keys (hot-swappable).
783    pub api_keys: ArcSwap<Vec<ApiKeyEntry>>,
784    /// Optional per-IP post-failure rate limiter (consulted *after* auth fails).
785    pub rate_limiter: Option<Arc<KeyedLimiter>>,
786    /// Optional per-IP pre-auth abuse gate (consulted *before* password-hash work).
787    /// mTLS-authenticated connections bypass this gate.
788    pub pre_auth_limiter: Option<Arc<KeyedLimiter>>,
789    #[cfg(feature = "oauth")]
790    /// Optional JWKS cache for OAuth JWT validation.
791    pub jwks_cache: Option<Arc<crate::oauth::JwksCache>>,
792    /// Tracks identity names that have already been logged at INFO level.
793    /// Subsequent auths for the same identity are logged at DEBUG.
794    pub seen_identities: Mutex<HashSet<String>>,
795    /// Lightweight in-memory auth success/failure counters for diagnostics.
796    pub counters: AuthCounters,
797}
798
799impl AuthState {
800    /// Atomically replace the API key list (lock-free, wait-free).
801    ///
802    /// New requests immediately see the updated keys.
803    /// In-flight requests that already loaded the old list finish
804    /// using it -- no torn reads.
805    pub(crate) fn reload_keys(&self, keys: Vec<ApiKeyEntry>) {
806        let count = keys.len();
807        self.api_keys.store(Arc::new(keys));
808        tracing::info!(keys = count, "API keys reloaded");
809    }
810
811    /// Snapshot auth counters for diagnostics and tests.
812    #[must_use]
813    pub(crate) fn counters_snapshot(&self) -> AuthCountersSnapshot {
814        self.counters.snapshot()
815    }
816
817    /// Produce the admin-endpoint list of API keys (metadata only, no hashes).
818    #[must_use]
819    pub(crate) fn api_key_summaries(&self) -> Vec<ApiKeySummary> {
820        self.api_keys
821            .load()
822            .iter()
823            .map(|k| ApiKeySummary {
824                name: k.name.clone(),
825                role: k.role.clone(),
826                expires_at: k.expires_at,
827            })
828            .collect()
829    }
830
831    /// Log auth success: INFO on first occurrence per identity, DEBUG after.
832    fn log_auth(&self, id: &AuthIdentity, method: &str) {
833        self.counters.record_success(id.method);
834        let first = self
835            .seen_identities
836            .lock()
837            .unwrap_or_else(std::sync::PoisonError::into_inner)
838            .insert(id.name.clone());
839        if first {
840            tracing::info!(name = %id.name, role = %id.role, "{method} authenticated");
841        } else {
842            tracing::debug!(name = %id.name, role = %id.role, "{method} authenticated");
843        }
844    }
845}
846
847/// Default auth rate limit: 30 attempts per minute per source IP.
848// SAFETY: unwrap() is safe - literal 30 is provably non-zero (const-evaluated).
849const DEFAULT_AUTH_RATE: NonZeroU32 = NonZeroU32::new(30).unwrap();
850
851/// Create a post-failure rate limiter from config.
852#[must_use]
853pub(crate) fn build_rate_limiter(config: &RateLimitConfig) -> Arc<KeyedLimiter> {
854    let quota = governor::Quota::per_minute(
855        NonZeroU32::new(config.max_attempts_per_minute).unwrap_or(DEFAULT_AUTH_RATE),
856    );
857    Arc::new(BoundedKeyedLimiter::new(
858        quota,
859        config.max_tracked_keys,
860        config.idle_eviction,
861    ))
862}
863
864/// Create a pre-auth abuse-gate rate limiter from config.
865///
866/// Quota: `pre_auth_max_per_minute` if set, otherwise
867/// `max_attempts_per_minute * 10` (capped at `u32::MAX`). The 10× factor
868/// keeps the gate generous enough for honest retries while still bounding
869/// attacker CPU on Argon2 verification.
870#[must_use]
871pub(crate) fn build_pre_auth_limiter(config: &RateLimitConfig) -> Arc<KeyedLimiter> {
872    let resolved = config.pre_auth_max_per_minute.unwrap_or_else(|| {
873        config
874            .max_attempts_per_minute
875            .saturating_mul(PRE_AUTH_DEFAULT_MULTIPLIER)
876    });
877    let quota =
878        governor::Quota::per_minute(NonZeroU32::new(resolved).unwrap_or(DEFAULT_PRE_AUTH_RATE));
879    Arc::new(BoundedKeyedLimiter::new(
880        quota,
881        config.max_tracked_keys,
882        config.idle_eviction,
883    ))
884}
885
886/// Default multiplier applied to `max_attempts_per_minute` when the operator
887/// does not set `pre_auth_max_per_minute` explicitly.
888const PRE_AUTH_DEFAULT_MULTIPLIER: u32 = 10;
889
890/// Default pre-auth abuse-gate rate (used only if both the configured value
891/// and the multiplied fallback are zero, which `NonZeroU32::new` rejects).
892// SAFETY: unwrap() is safe - literal 300 is provably non-zero (const-evaluated).
893const DEFAULT_PRE_AUTH_RATE: NonZeroU32 = NonZeroU32::new(300).unwrap();
894
895/// Parse an mTLS client certificate and extract an `AuthIdentity`.
896///
897/// Reads the Subject CN as the identity name. Falls back to the first
898/// DNS SAN if CN is absent. The role is taken from the `MtlsConfig`.
899#[must_use]
900pub fn extract_mtls_identity(cert_der: &[u8], default_role: &str) -> Option<AuthIdentity> {
901    let (_, cert) = X509Certificate::from_der(cert_der).ok()?;
902
903    // Try CN from Subject first.
904    let cn = cert
905        .subject()
906        .iter_common_name()
907        .next()
908        .and_then(|attr| attr.as_str().ok())
909        .map(String::from);
910
911    // Fall back to first DNS SAN.
912    let name = cn.or_else(|| {
913        cert.subject_alternative_name()
914            .ok()
915            .flatten()
916            .and_then(|san| {
917                #[allow(clippy::wildcard_enum_match_arm)]
918                san.value.general_names.iter().find_map(|gn| match gn {
919                    GeneralName::DNSName(dns) => Some((*dns).to_owned()),
920                    _ => None,
921                })
922            })
923    })?;
924
925    // Reject identities with characters unsafe for logging and RBAC matching.
926    if !name
927        .chars()
928        .all(|c| c.is_alphanumeric() || matches!(c, '-' | '.' | '_' | '@'))
929    {
930        tracing::warn!(cn = %name, "mTLS identity rejected: invalid characters in CN/SAN");
931        return None;
932    }
933
934    Some(AuthIdentity {
935        name,
936        role: default_role.to_owned(),
937        method: AuthMethod::MtlsCertificate,
938        raw_token: None,
939        sub: None,
940    })
941}
942
943/// Extract the bearer token from an `Authorization` header value.
944///
945/// Implements RFC 7235 §2.1: the auth-scheme token is **case-insensitive**.
946/// `Bearer`, `bearer`, `BEARER`, and `BeArEr` all parse equivalently. Any
947/// leading whitespace between the scheme and the token is trimmed (per
948/// RFC 7235 the separator is one or more SP characters; we accept the
949/// common single-space form plus tolerate extras).
950///
951/// Returns `None` if the header value:
952/// - does not contain a space (no scheme/credentials boundary), or
953/// - uses a scheme other than `Bearer` (case-insensitively).
954///
955/// The caller is responsible for token-level validation (length, charset,
956/// signature, etc.); this helper only handles the scheme prefix.
957fn extract_bearer(value: &str) -> Option<&str> {
958    let (scheme, rest) = value.split_once(' ')?;
959    if scheme.eq_ignore_ascii_case("Bearer") {
960        let token = rest.trim_start_matches(' ');
961        if token.is_empty() { None } else { Some(token) }
962    } else {
963        None
964    }
965}
966
967/// Verify a bearer token against configured API keys.
968///
969/// Argon2id verification is CPU-intensive, so this should be called via
970/// `spawn_blocking`. Returns the matching identity if the token is valid.
971///
972/// # Timing-side-channel resistance
973///
974/// Always performs **exactly one Argon2id verification per configured key**,
975/// regardless of:
976///
977/// * which slot (if any) matches the presented token, or
978/// * whether a key has expired.
979///
980/// Expired and post-match slots are verified against an internal dummy PHC hash,
981/// a fixed Argon2id PHC string with the same cost parameters as the real
982/// hashes. This bounds the timing observable to "one Argon2 per configured
983/// key" regardless of which (if any) slot held the matching credential,
984/// closing the first-match latency oracle (CWE-208) and the expired-slot
985/// timing leak.
986///
987/// `subtle::ConstantTimeEq` is used to fold per-slot match bits into the
988/// final result so the compiler cannot reintroduce a data-dependent branch.
989///
990/// # Panics
991///
992/// Panics if the internal dummy PHC hash cannot be parsed as an Argon2id PHC string.
993/// This is impossible by construction: the static is generated by
994/// [`argon2::Argon2::hash_password`] which always emits a valid PHC string.
995#[must_use]
996pub fn verify_bearer_token(token: &str, keys: &[ApiKeyEntry]) -> Option<AuthIdentity> {
997    use subtle::ConstantTimeEq as _;
998
999    let now = chrono::Utc::now();
1000    let dummy_hash = PasswordHash::new(&DUMMY_PHC_HASH)
1001        .expect("DUMMY_PHC_HASH is a valid Argon2id PHC string by construction");
1002
1003    let mut matched_index: usize = usize::MAX;
1004    let mut any_match: u8 = 0;
1005
1006    for (idx, key) in keys.iter().enumerate() {
1007        let expired = key.expires_at.is_some_and(|exp| exp.as_datetime() < &now);
1008
1009        let real_hash = PasswordHash::new(&key.hash);
1010        let verify_against = match (&real_hash, expired, any_match) {
1011            (Ok(h), false, 0) => h,
1012            _ => &dummy_hash,
1013        };
1014
1015        let slot_ok = u8::from(
1016            Argon2::default()
1017                .verify_password(token.as_bytes(), verify_against)
1018                .is_ok(),
1019        );
1020
1021        let real_match = slot_ok & u8::from(!expired) & u8::from(real_hash.is_ok());
1022        let first_real_match = real_match & (1 - any_match);
1023        if first_real_match.ct_eq(&1).into() {
1024            matched_index = idx;
1025        }
1026        any_match |= real_match;
1027    }
1028
1029    if any_match == 0 {
1030        return None;
1031    }
1032    let key = keys.get(matched_index)?;
1033    Some(AuthIdentity {
1034        name: key.name.clone(),
1035        role: key.role.clone(),
1036        method: AuthMethod::BearerToken,
1037        raw_token: None,
1038        sub: None,
1039    })
1040}
1041
1042/// Fixed Argon2id PHC hash used as a constant-time placeholder when an
1043/// API-key slot is expired, malformed, or follows the matching slot.
1044///
1045/// Generated once on first access using the same default Argon2 cost
1046/// parameters as live verifications, so the dummy verify takes
1047/// indistinguishable wall time from a real one. The plaintext
1048/// (`"rmcp-server-kit-dummy"`) and the fixed salt are unrelated to any
1049/// real credential — randomness is unnecessary because this hash is
1050/// only ever compared against attacker-supplied input on slots that
1051/// will be discarded regardless of match result. Using a fixed salt
1052/// avoids depending on `rand_core`'s `getrandom` feature, which is not
1053/// activated transitively in every feature configuration of this crate.
1054static DUMMY_PHC_HASH: LazyLock<String> = LazyLock::new(|| {
1055    // 16 bytes of base64 (`AAAA...`) — minimum valid Argon2 salt length.
1056    let salt = SaltString::from_b64("AAAAAAAAAAAAAAAAAAAAAA")
1057        .expect("fixed 16-byte base64 salt is well-formed");
1058    Argon2::default()
1059        .hash_password(b"rmcp-server-kit-dummy", &salt)
1060        .expect("Argon2 default params hash a fixed plaintext")
1061        .to_string()
1062});
1063
1064/// Generate a new API key: 256-bit random token + Argon2id hash.
1065///
1066/// Returns `(plaintext_token, argon2id_hash_phc_string)`.
1067/// The plaintext is shown once to the user and never stored.
1068///
1069/// # Errors
1070///
1071/// Returns an error if salt encoding or Argon2id hashing fails
1072/// (should not happen with valid inputs, but we avoid panicking).
1073pub fn generate_api_key() -> Result<(String, String), McpxError> {
1074    let mut token_bytes = [0u8; 32];
1075    rand::fill(&mut token_bytes);
1076    let token = URL_SAFE_NO_PAD.encode(token_bytes);
1077
1078    // Generate 16 random bytes for salt, encode as base64 for SaltString.
1079    let mut salt_bytes = [0u8; 16];
1080    rand::fill(&mut salt_bytes);
1081    let salt = SaltString::encode_b64(&salt_bytes)
1082        .map_err(|e| McpxError::Auth(format!("salt encoding failed: {e}")))?;
1083    let hash = Argon2::default()
1084        .hash_password(token.as_bytes(), &salt)
1085        .map_err(|e| McpxError::Auth(format!("argon2id hashing failed: {e}")))?
1086        .to_string();
1087
1088    Ok((token, hash))
1089}
1090
1091fn build_www_authenticate_value(
1092    advertise_resource_metadata: bool,
1093    failure: AuthFailureClass,
1094) -> String {
1095    let (error, error_description) = failure.bearer_error();
1096    if advertise_resource_metadata {
1097        return format!(
1098            "Bearer resource_metadata=\"/.well-known/oauth-protected-resource\", error=\"{error}\", error_description=\"{error_description}\""
1099        );
1100    }
1101    format!("Bearer error=\"{error}\", error_description=\"{error_description}\"")
1102}
1103
1104fn auth_method_label(method: AuthMethod) -> &'static str {
1105    match method {
1106        AuthMethod::MtlsCertificate => "mTLS",
1107        AuthMethod::BearerToken => "bearer token",
1108        AuthMethod::OAuthJwt => "OAuth JWT",
1109    }
1110}
1111
1112#[cfg_attr(not(feature = "oauth"), allow(unused_variables))]
1113fn unauthorized_response(state: &AuthState, failure_class: AuthFailureClass) -> Response {
1114    #[cfg(feature = "oauth")]
1115    let advertise_resource_metadata = state.jwks_cache.is_some();
1116    #[cfg(not(feature = "oauth"))]
1117    let advertise_resource_metadata = false;
1118
1119    let challenge = build_www_authenticate_value(advertise_resource_metadata, failure_class);
1120    (
1121        axum::http::StatusCode::UNAUTHORIZED,
1122        [(header::WWW_AUTHENTICATE, challenge)],
1123        failure_class.response_body(),
1124    )
1125        .into_response()
1126}
1127
1128async fn authenticate_bearer_identity(
1129    state: &AuthState,
1130    token: &str,
1131) -> Result<AuthIdentity, AuthFailureClass> {
1132    let mut failure_class = AuthFailureClass::MissingCredential;
1133
1134    #[cfg(feature = "oauth")]
1135    if let Some(ref cache) = state.jwks_cache
1136        && crate::oauth::looks_like_jwt(token)
1137    {
1138        match cache.validate_token_with_reason(token).await {
1139            Ok(mut id) => {
1140                id.raw_token = Some(SecretString::from(token.to_owned()));
1141                return Ok(id);
1142            }
1143            Err(crate::oauth::JwtValidationFailure::Expired) => {
1144                failure_class = AuthFailureClass::ExpiredCredential;
1145            }
1146            Err(crate::oauth::JwtValidationFailure::Invalid) => {
1147                failure_class = AuthFailureClass::InvalidCredential;
1148            }
1149        }
1150    }
1151
1152    let token = token.to_owned();
1153    let keys = state.api_keys.load_full(); // Arc clone, lock-free
1154
1155    // Argon2id is CPU-bound - offload to blocking thread pool.
1156    let identity = tokio::task::spawn_blocking(move || verify_bearer_token(&token, &keys))
1157        .await
1158        .ok()
1159        .flatten();
1160
1161    if let Some(id) = identity {
1162        return Ok(id);
1163    }
1164
1165    if failure_class == AuthFailureClass::MissingCredential {
1166        failure_class = AuthFailureClass::InvalidCredential;
1167    }
1168
1169    Err(failure_class)
1170}
1171
1172/// Consult the pre-auth abuse gate for the given peer.
1173///
1174/// Returns `Some(response)` if the request should be rejected (limiter
1175/// configured AND quota exhausted for this source IP). Returns `None`
1176/// otherwise (limiter absent, peer address unknown, or quota available),
1177/// in which case the caller should proceed with credential verification.
1178///
1179/// Side effects on rejection: increments the `pre_auth_gate` failure
1180/// counter and emits a warn-level log. mTLS-authenticated requests must
1181/// be admitted by the caller *before* invoking this helper.
1182fn pre_auth_gate(state: &AuthState, peer_addr: Option<SocketAddr>) -> Option<Response> {
1183    let limiter = state.pre_auth_limiter.as_ref()?;
1184    let addr = peer_addr?;
1185    if limiter.check_key(&addr.ip()).is_ok() {
1186        return None;
1187    }
1188    state.counters.record_failure(AuthFailureClass::PreAuthGate);
1189    tracing::warn!(
1190        ip = %addr.ip(),
1191        "auth rate limited by pre-auth gate (request rejected before credential verification)"
1192    );
1193    Some(
1194        McpxError::RateLimited("too many unauthenticated requests from this source".into())
1195            .into_response(),
1196    )
1197}
1198
1199/// Axum middleware that enforces authentication.
1200///
1201/// Tries authentication methods in priority order:
1202/// 1. mTLS client certificate identity (populated by TLS acceptor)
1203/// 2. Bearer token from `Authorization` header
1204///
1205/// Failed authentication attempts are rate-limited per source IP.
1206/// Successful authentications do not consume rate limit budget.
1207pub(crate) async fn auth_middleware(
1208    state: Arc<AuthState>,
1209    req: Request<Body>,
1210    next: Next,
1211) -> Response {
1212    // Extract peer address (and any mTLS identity) from ConnectInfo.
1213    // Plain TCP: ConnectInfo<SocketAddr>. TLS / mTLS: ConnectInfo<TlsConnInfo>,
1214    // which carries the verified identity directly on the connection — no
1215    // shared map, no port-reuse aliasing.
1216    let tls_info = req.extensions().get::<ConnectInfo<TlsConnInfo>>().cloned();
1217    let peer_addr = req
1218        .extensions()
1219        .get::<ConnectInfo<SocketAddr>>()
1220        .map(|ci| ci.0)
1221        .or_else(|| tls_info.as_ref().map(|ci| ci.0.addr));
1222
1223    // 1. Try mTLS identity (extracted by the TLS acceptor during handshake
1224    //    and attached to the connection itself).
1225    //
1226    //    mTLS connections bypass the pre-auth abuse gate below: the TLS
1227    //    handshake already performed expensive crypto with a verified peer,
1228    //    so we trust them not to be a CPU-spray attacker.
1229    if let Some(id) = tls_info.and_then(|ci| ci.0.identity) {
1230        state.log_auth(&id, "mTLS");
1231        let mut req = req;
1232        req.extensions_mut().insert(id);
1233        return next.run(req).await;
1234    }
1235
1236    // 2. Pre-auth abuse gate: rejects CPU-spray attacks BEFORE the Argon2id
1237    //    verification path runs. Keyed by source IP. mTLS connections (above)
1238    //    are exempt; this gate only protects the bearer/JWT verification path.
1239    if let Some(blocked) = pre_auth_gate(&state, peer_addr) {
1240        return blocked;
1241    }
1242
1243    let failure_class = if let Some(value) = req.headers().get(header::AUTHORIZATION) {
1244        match value.to_str().ok().and_then(extract_bearer) {
1245            Some(token) => match authenticate_bearer_identity(&state, token).await {
1246                Ok(id) => {
1247                    state.log_auth(&id, auth_method_label(id.method));
1248                    let mut req = req;
1249                    req.extensions_mut().insert(id);
1250                    return next.run(req).await;
1251                }
1252                Err(class) => class,
1253            },
1254            None => AuthFailureClass::InvalidCredential,
1255        }
1256    } else {
1257        AuthFailureClass::MissingCredential
1258    };
1259
1260    tracing::warn!(failure_class = %failure_class.as_str(), "auth failed");
1261
1262    // Rate limit check (applied after auth failure only).
1263    // Successful authentications do not consume rate limit budget.
1264    if let (Some(limiter), Some(addr)) = (&state.rate_limiter, peer_addr)
1265        && limiter.check_key(&addr.ip()).is_err()
1266    {
1267        state.counters.record_failure(AuthFailureClass::RateLimited);
1268        tracing::warn!(ip = %addr.ip(), "auth rate limited after repeated failures");
1269        return McpxError::RateLimited("too many failed authentication attempts".into())
1270            .into_response();
1271    }
1272
1273    state.counters.record_failure(failure_class);
1274    unauthorized_response(&state, failure_class)
1275}
1276
1277#[cfg(test)]
1278mod tests {
1279    use super::*;
1280
1281    #[test]
1282    fn generate_and_verify_api_key() {
1283        let (token, hash) = generate_api_key().unwrap();
1284
1285        // Token is 43 chars (256-bit base64url, no padding)
1286        assert_eq!(token.len(), 43);
1287
1288        // Hash is a valid PHC string
1289        assert!(hash.starts_with("$argon2id$"));
1290
1291        // Verification succeeds with correct token
1292        let keys = vec![ApiKeyEntry {
1293            name: "test".into(),
1294            hash,
1295            role: "viewer".into(),
1296            expires_at: None,
1297        }];
1298        let id = verify_bearer_token(&token, &keys);
1299        assert!(id.is_some());
1300        let id = id.unwrap();
1301        assert_eq!(id.name, "test");
1302        assert_eq!(id.role, "viewer");
1303        assert_eq!(id.method, AuthMethod::BearerToken);
1304    }
1305
1306    #[test]
1307    fn wrong_token_rejected() {
1308        let (_token, hash) = generate_api_key().unwrap();
1309        let keys = vec![ApiKeyEntry {
1310            name: "test".into(),
1311            hash,
1312            role: "viewer".into(),
1313            expires_at: None,
1314        }];
1315        assert!(verify_bearer_token("wrong-token", &keys).is_none());
1316    }
1317
1318    #[test]
1319    fn expired_key_rejected() {
1320        let (token, hash) = generate_api_key().unwrap();
1321        let keys = vec![ApiKeyEntry {
1322            name: "test".into(),
1323            hash,
1324            role: "viewer".into(),
1325            expires_at: Some(RfcTimestamp::parse("2020-01-01T00:00:00Z").unwrap()),
1326        }];
1327        assert!(verify_bearer_token(&token, &keys).is_none());
1328    }
1329
1330    #[test]
1331    fn match_in_last_slot_still_authenticates() {
1332        let (token, hash) = generate_api_key().unwrap();
1333        let (_other_token, other_hash) = generate_api_key().unwrap();
1334        let keys = vec![
1335            ApiKeyEntry {
1336                name: "first".into(),
1337                hash: other_hash.clone(),
1338                role: "viewer".into(),
1339                expires_at: None,
1340            },
1341            ApiKeyEntry {
1342                name: "second".into(),
1343                hash: other_hash,
1344                role: "viewer".into(),
1345                expires_at: None,
1346            },
1347            ApiKeyEntry {
1348                name: "match".into(),
1349                hash,
1350                role: "ops".into(),
1351                expires_at: None,
1352            },
1353        ];
1354        let id = verify_bearer_token(&token, &keys).expect("last-slot match must authenticate");
1355        assert_eq!(id.name, "match");
1356        assert_eq!(id.role, "ops");
1357    }
1358
1359    #[test]
1360    fn expired_slot_before_valid_match_does_not_short_circuit() {
1361        let (token, hash) = generate_api_key().unwrap();
1362        let (_, other_hash) = generate_api_key().unwrap();
1363        let keys = vec![
1364            ApiKeyEntry {
1365                name: "expired".into(),
1366                hash: other_hash,
1367                role: "viewer".into(),
1368                expires_at: Some(RfcTimestamp::parse("2020-01-01T00:00:00Z").unwrap()),
1369            },
1370            ApiKeyEntry {
1371                name: "valid".into(),
1372                hash,
1373                role: "ops".into(),
1374                expires_at: None,
1375            },
1376        ];
1377        let id = verify_bearer_token(&token, &keys)
1378            .expect("valid slot following an expired slot must authenticate");
1379        assert_eq!(id.name, "valid");
1380    }
1381
1382    #[test]
1383    fn malformed_hash_slot_does_not_short_circuit() {
1384        let (token, hash) = generate_api_key().unwrap();
1385        let keys = vec![
1386            ApiKeyEntry {
1387                name: "broken".into(),
1388                hash: "this-is-not-a-phc-string".into(),
1389                role: "viewer".into(),
1390                expires_at: None,
1391            },
1392            ApiKeyEntry {
1393                name: "valid".into(),
1394                hash,
1395                role: "ops".into(),
1396                expires_at: None,
1397            },
1398        ];
1399        let id = verify_bearer_token(&token, &keys)
1400            .expect("valid slot following a malformed-hash slot must authenticate");
1401        assert_eq!(id.name, "valid");
1402    }
1403
1404    // Regression tests for H3 (api_key_expires_at_fail_open).
1405    //
1406    // Prior to 1.6.0 the runtime expiry check used a chained
1407    // `if let Some(_) && let Ok(exp) = parse(_) && exp < now` which
1408    // silently fell through on parse error, letting a key with
1409    // `expires_at = "not-a-date"` authenticate forever. These tests
1410    // pin the type-system fix: malformed RFC 3339 is rejected at
1411    // deserialization time (no `RfcTimestamp` can ever be malformed),
1412    // and the runtime check is a pure comparison with no parse path.
1413
1414    #[test]
1415    fn rfc_timestamp_parse_rejects_malformed() {
1416        for bad in [
1417            "not-a-date",
1418            "",
1419            "2025-13-01T00:00:00Z", // month 13
1420            "2025-01-32T00:00:00Z", // day 32
1421            "2025-01-01T00:00:00",  // missing offset
1422            "01/01/2025",           // wrong format
1423            "2025-01-01T25:00:00Z", // hour 25
1424        ] {
1425            assert!(
1426                RfcTimestamp::parse(bad).is_err(),
1427                "RfcTimestamp::parse must reject {bad:?}"
1428            );
1429        }
1430    }
1431
1432    #[test]
1433    fn rfc_timestamp_parse_accepts_valid() {
1434        for good in [
1435            "2025-01-01T00:00:00Z",
1436            "2025-01-01T00:00:00+00:00",
1437            "2025-12-31T23:59:59-08:00",
1438            "2099-01-01T00:00:00.123456789Z",
1439        ] {
1440            assert!(
1441                RfcTimestamp::parse(good).is_ok(),
1442                "RfcTimestamp::parse must accept {good:?}"
1443            );
1444        }
1445    }
1446
1447    #[test]
1448    fn api_key_entry_deserialize_rejects_malformed_expires_at() {
1449        // TOML with a malformed expires_at must fail to deserialize.
1450        // This is the load-time defense: a typo in auth.toml aborts
1451        // config load with a clear serde error, instead of producing
1452        // a key that authenticates forever (the H3 fail-open).
1453        let toml = r#"
1454            name = "bad-key"
1455            hash = "$argon2id$v=19$m=19456,t=2,p=1$c2FsdA$h4sh"
1456            role = "viewer"
1457            expires_at = "not-a-date"
1458        "#;
1459        let result: Result<ApiKeyEntry, _> = toml::from_str(toml);
1460        assert!(
1461            result.is_err(),
1462            "deserialization must reject malformed expires_at"
1463        );
1464    }
1465
1466    #[test]
1467    fn api_key_entry_deserialize_accepts_valid_expires_at() {
1468        let toml = r#"
1469            name = "good-key"
1470            hash = "$argon2id$v=19$m=19456,t=2,p=1$c2FsdA$h4sh"
1471            role = "viewer"
1472            expires_at = "2099-01-01T00:00:00Z"
1473        "#;
1474        let entry: ApiKeyEntry = toml::from_str(toml).expect("valid RFC 3339 must deserialize");
1475        assert!(entry.expires_at.is_some());
1476    }
1477
1478    #[test]
1479    fn api_key_entry_deserialize_accepts_missing_expires_at() {
1480        // Omitting expires_at must continue to mean "no expiry"; this
1481        // is the documented contract and must survive the H3 fix.
1482        let toml = r#"
1483            name = "eternal-key"
1484            hash = "$argon2id$v=19$m=19456,t=2,p=1$c2FsdA$h4sh"
1485            role = "viewer"
1486        "#;
1487        let entry: ApiKeyEntry = toml::from_str(toml).expect("missing expires_at must deserialize");
1488        assert!(entry.expires_at.is_none());
1489    }
1490
1491    #[test]
1492    fn try_with_expiry_rejects_malformed() {
1493        let entry = ApiKeyEntry::new("k", "hash", "viewer");
1494        assert!(entry.try_with_expiry("not-a-date").is_err());
1495    }
1496
1497    #[test]
1498    fn try_with_expiry_accepts_valid() {
1499        let entry = ApiKeyEntry::new("k", "hash", "viewer")
1500            .try_with_expiry("2099-01-01T00:00:00Z")
1501            .expect("valid RFC 3339 must be accepted");
1502        assert!(entry.expires_at.is_some());
1503    }
1504
1505    #[test]
1506    fn api_key_summary_serializes_expires_at_as_rfc3339() {
1507        // The admin endpoint wire format is `{"expires_at": "RFC 3339 str"}`.
1508        // Pinning this prevents an accidental serialization-format change
1509        // (e.g. chrono's debug form, a Unix timestamp) that would silently
1510        // break operator tooling that parses these payloads.
1511        let summary = ApiKeySummary {
1512            name: "k".into(),
1513            role: "viewer".into(),
1514            expires_at: Some(RfcTimestamp::parse("2030-01-01T00:00:00Z").unwrap()),
1515        };
1516        let json = serde_json::to_string(&summary).unwrap();
1517        assert!(
1518            json.contains(r#""expires_at":"2030-01-01T00:00:00+00:00""#),
1519            "wire format regressed: {json}"
1520        );
1521    }
1522
1523    #[test]
1524    fn future_expiry_accepted() {
1525        let (token, hash) = generate_api_key().unwrap();
1526        let keys = vec![ApiKeyEntry {
1527            name: "test".into(),
1528            hash,
1529            role: "viewer".into(),
1530            expires_at: Some(RfcTimestamp::parse("2099-01-01T00:00:00Z").unwrap()),
1531        }];
1532        assert!(verify_bearer_token(&token, &keys).is_some());
1533    }
1534
1535    #[test]
1536    fn multiple_keys_first_match_wins() {
1537        let (token, hash) = generate_api_key().unwrap();
1538        let keys = vec![
1539            ApiKeyEntry {
1540                name: "wrong".into(),
1541                hash: "$argon2id$v=19$m=19456,t=2,p=1$invalid$invalid".into(),
1542                role: "ops".into(),
1543                expires_at: None,
1544            },
1545            ApiKeyEntry {
1546                name: "correct".into(),
1547                hash,
1548                role: "deploy".into(),
1549                expires_at: None,
1550            },
1551        ];
1552        let id = verify_bearer_token(&token, &keys).unwrap();
1553        assert_eq!(id.name, "correct");
1554        assert_eq!(id.role, "deploy");
1555    }
1556
1557    #[test]
1558    fn rate_limiter_allows_within_quota() {
1559        let config = RateLimitConfig {
1560            max_attempts_per_minute: 5,
1561            pre_auth_max_per_minute: None,
1562            ..Default::default()
1563        };
1564        let limiter = build_rate_limiter(&config);
1565        let ip: IpAddr = "10.0.0.1".parse().unwrap();
1566
1567        // First 5 should succeed.
1568        for _ in 0..5 {
1569            assert!(limiter.check_key(&ip).is_ok());
1570        }
1571        // 6th should fail.
1572        assert!(limiter.check_key(&ip).is_err());
1573    }
1574
1575    #[test]
1576    fn rate_limiter_separate_ips() {
1577        let config = RateLimitConfig {
1578            max_attempts_per_minute: 2,
1579            pre_auth_max_per_minute: None,
1580            ..Default::default()
1581        };
1582        let limiter = build_rate_limiter(&config);
1583        let ip1: IpAddr = "10.0.0.1".parse().unwrap();
1584        let ip2: IpAddr = "10.0.0.2".parse().unwrap();
1585
1586        // Exhaust ip1's quota.
1587        assert!(limiter.check_key(&ip1).is_ok());
1588        assert!(limiter.check_key(&ip1).is_ok());
1589        assert!(limiter.check_key(&ip1).is_err());
1590
1591        // ip2 should still have quota.
1592        assert!(limiter.check_key(&ip2).is_ok());
1593    }
1594
1595    #[test]
1596    fn extract_mtls_identity_from_cn() {
1597        // Generate a cert with explicit CN.
1598        let mut params = rcgen::CertificateParams::new(vec!["test-client.local".into()]).unwrap();
1599        params.distinguished_name = rcgen::DistinguishedName::new();
1600        params
1601            .distinguished_name
1602            .push(rcgen::DnType::CommonName, "test-client");
1603        let cert = params
1604            .self_signed(&rcgen::KeyPair::generate().unwrap())
1605            .unwrap();
1606        let der = cert.der();
1607
1608        let id = extract_mtls_identity(der, "ops").unwrap();
1609        assert_eq!(id.name, "test-client");
1610        assert_eq!(id.role, "ops");
1611        assert_eq!(id.method, AuthMethod::MtlsCertificate);
1612    }
1613
1614    #[test]
1615    fn extract_mtls_identity_falls_back_to_san() {
1616        // Cert with no CN but has a DNS SAN.
1617        let mut params =
1618            rcgen::CertificateParams::new(vec!["san-only.example.com".into()]).unwrap();
1619        params.distinguished_name = rcgen::DistinguishedName::new();
1620        // No CN set - should fall back to DNS SAN.
1621        let cert = params
1622            .self_signed(&rcgen::KeyPair::generate().unwrap())
1623            .unwrap();
1624        let der = cert.der();
1625
1626        let id = extract_mtls_identity(der, "viewer").unwrap();
1627        assert_eq!(id.name, "san-only.example.com");
1628        assert_eq!(id.role, "viewer");
1629    }
1630
1631    #[test]
1632    fn extract_mtls_identity_invalid_der() {
1633        assert!(extract_mtls_identity(b"not-a-cert", "viewer").is_none());
1634    }
1635
1636    // -- auth_middleware integration tests --
1637
1638    use axum::{
1639        body::Body,
1640        http::{Request, StatusCode},
1641    };
1642    use tower::ServiceExt as _;
1643
1644    fn auth_router(state: Arc<AuthState>) -> axum::Router {
1645        axum::Router::new()
1646            .route("/mcp", axum::routing::post(|| async { "ok" }))
1647            .layer(axum::middleware::from_fn(move |req, next| {
1648                let s = Arc::clone(&state);
1649                auth_middleware(s, req, next)
1650            }))
1651    }
1652
1653    fn test_auth_state(keys: Vec<ApiKeyEntry>) -> Arc<AuthState> {
1654        Arc::new(AuthState {
1655            api_keys: ArcSwap::new(Arc::new(keys)),
1656            rate_limiter: None,
1657            pre_auth_limiter: None,
1658            #[cfg(feature = "oauth")]
1659            jwks_cache: None,
1660            seen_identities: Mutex::new(HashSet::new()),
1661            counters: AuthCounters::default(),
1662        })
1663    }
1664
1665    #[tokio::test]
1666    async fn middleware_rejects_no_credentials() {
1667        let state = test_auth_state(vec![]);
1668        let app = auth_router(Arc::clone(&state));
1669        let req = Request::builder()
1670            .method(axum::http::Method::POST)
1671            .uri("/mcp")
1672            .body(Body::empty())
1673            .unwrap();
1674        let resp = app.oneshot(req).await.unwrap();
1675        assert_eq!(resp.status(), StatusCode::UNAUTHORIZED);
1676        let challenge = resp
1677            .headers()
1678            .get(header::WWW_AUTHENTICATE)
1679            .unwrap()
1680            .to_str()
1681            .unwrap();
1682        assert!(challenge.contains("error=\"invalid_request\""));
1683
1684        let counters = state.counters_snapshot();
1685        assert_eq!(counters.failure_missing_credential, 1);
1686    }
1687
1688    #[tokio::test]
1689    async fn middleware_accepts_valid_bearer() {
1690        let (token, hash) = generate_api_key().unwrap();
1691        let keys = vec![ApiKeyEntry {
1692            name: "test-key".into(),
1693            hash,
1694            role: "ops".into(),
1695            expires_at: None,
1696        }];
1697        let state = test_auth_state(keys);
1698        let app = auth_router(Arc::clone(&state));
1699        let req = Request::builder()
1700            .method(axum::http::Method::POST)
1701            .uri("/mcp")
1702            .header("authorization", format!("Bearer {token}"))
1703            .body(Body::empty())
1704            .unwrap();
1705        let resp = app.oneshot(req).await.unwrap();
1706        assert_eq!(resp.status(), StatusCode::OK);
1707
1708        let counters = state.counters_snapshot();
1709        assert_eq!(counters.success_bearer, 1);
1710    }
1711
1712    #[tokio::test]
1713    async fn middleware_rejects_wrong_bearer() {
1714        let (_token, hash) = generate_api_key().unwrap();
1715        let keys = vec![ApiKeyEntry {
1716            name: "test-key".into(),
1717            hash,
1718            role: "ops".into(),
1719            expires_at: None,
1720        }];
1721        let state = test_auth_state(keys);
1722        let app = auth_router(Arc::clone(&state));
1723        let req = Request::builder()
1724            .method(axum::http::Method::POST)
1725            .uri("/mcp")
1726            .header("authorization", "Bearer wrong-token-here")
1727            .body(Body::empty())
1728            .unwrap();
1729        let resp = app.oneshot(req).await.unwrap();
1730        assert_eq!(resp.status(), StatusCode::UNAUTHORIZED);
1731        let challenge = resp
1732            .headers()
1733            .get(header::WWW_AUTHENTICATE)
1734            .unwrap()
1735            .to_str()
1736            .unwrap();
1737        assert!(challenge.contains("error=\"invalid_token\""));
1738
1739        let counters = state.counters_snapshot();
1740        assert_eq!(counters.failure_invalid_credential, 1);
1741    }
1742
1743    #[tokio::test]
1744    async fn middleware_rate_limits() {
1745        let state = Arc::new(AuthState {
1746            api_keys: ArcSwap::new(Arc::new(vec![])),
1747            rate_limiter: Some(build_rate_limiter(&RateLimitConfig {
1748                max_attempts_per_minute: 1,
1749                pre_auth_max_per_minute: None,
1750                ..Default::default()
1751            })),
1752            pre_auth_limiter: None,
1753            #[cfg(feature = "oauth")]
1754            jwks_cache: None,
1755            seen_identities: Mutex::new(HashSet::new()),
1756            counters: AuthCounters::default(),
1757        });
1758        let app = auth_router(state);
1759
1760        // First request: UNAUTHORIZED (no credentials, but not rate limited)
1761        let req = Request::builder()
1762            .method(axum::http::Method::POST)
1763            .uri("/mcp")
1764            .body(Body::empty())
1765            .unwrap();
1766        let resp = app.clone().oneshot(req).await.unwrap();
1767        assert_eq!(resp.status(), StatusCode::UNAUTHORIZED);
1768
1769        // Second request from same "IP" (no ConnectInfo in test, so peer_addr is None
1770        // and rate limiter won't fire). That's expected -- rate limiting requires
1771        // ConnectInfo which isn't available in unit tests without a real server.
1772        // This test verifies the middleware wiring doesn't panic.
1773    }
1774
1775    /// Verify that rate limit semantics: only failed auth attempts consume budget.
1776    ///
1777    /// This is a unit test of the limiter behavior. The middleware integration
1778    /// is that on auth failure, `check_key` is called; on auth success, it is NOT.
1779    /// Full e2e tests verify the middleware routing but require `ConnectInfo`.
1780    #[test]
1781    fn rate_limit_semantics_failed_only() {
1782        let config = RateLimitConfig {
1783            max_attempts_per_minute: 3,
1784            pre_auth_max_per_minute: None,
1785            ..Default::default()
1786        };
1787        let limiter = build_rate_limiter(&config);
1788        let ip: IpAddr = "192.168.1.100".parse().unwrap();
1789
1790        // Simulate: 3 failed attempts should exhaust quota.
1791        assert!(
1792            limiter.check_key(&ip).is_ok(),
1793            "failure 1 should be allowed"
1794        );
1795        assert!(
1796            limiter.check_key(&ip).is_ok(),
1797            "failure 2 should be allowed"
1798        );
1799        assert!(
1800            limiter.check_key(&ip).is_ok(),
1801            "failure 3 should be allowed"
1802        );
1803        assert!(
1804            limiter.check_key(&ip).is_err(),
1805            "failure 4 should be blocked"
1806        );
1807
1808        // In the actual middleware flow:
1809        // - Successful auth: verify_bearer_token returns Some, we return early
1810        //   WITHOUT calling check_key, so no budget consumed.
1811        // - Failed auth: verify_bearer_token returns None, we call check_key
1812        //   THEN return 401, so budget is consumed.
1813        //
1814        // This means N successful requests followed by M failed requests
1815        // will only count M toward the rate limit, not N+M.
1816    }
1817
1818    // -- pre-auth abuse gate (H-S1) --
1819
1820    /// The pre-auth gate must default to ~10x the post-failure quota so honest
1821    /// retry storms never trip it but a Argon2-spray attacker is throttled.
1822    #[test]
1823    fn pre_auth_default_multiplier_is_10x() {
1824        let config = RateLimitConfig {
1825            max_attempts_per_minute: 5,
1826            pre_auth_max_per_minute: None,
1827            ..Default::default()
1828        };
1829        let limiter = build_pre_auth_limiter(&config);
1830        let ip: IpAddr = "10.0.0.1".parse().unwrap();
1831
1832        // Quota should be 50 (5 * 10), not 5. We expect the first 50 to pass.
1833        for i in 0..50 {
1834            assert!(
1835                limiter.check_key(&ip).is_ok(),
1836                "pre-auth attempt {i} (of expected 50) should be allowed under default 10x multiplier"
1837            );
1838        }
1839        // The 51st attempt must be blocked: confirms quota is bounded, not infinite.
1840        assert!(
1841            limiter.check_key(&ip).is_err(),
1842            "pre-auth attempt 51 should be blocked (quota is 50, not unbounded)"
1843        );
1844    }
1845
1846    /// An explicit `pre_auth_max_per_minute` override must win over the
1847    /// 10x-multiplier default.
1848    #[test]
1849    fn pre_auth_explicit_override_wins() {
1850        let config = RateLimitConfig {
1851            max_attempts_per_minute: 100,     // would default to 1000 pre-auth quota
1852            pre_auth_max_per_minute: Some(2), // but operator caps at 2
1853            ..Default::default()
1854        };
1855        let limiter = build_pre_auth_limiter(&config);
1856        let ip: IpAddr = "10.0.0.2".parse().unwrap();
1857
1858        assert!(limiter.check_key(&ip).is_ok(), "attempt 1 allowed");
1859        assert!(limiter.check_key(&ip).is_ok(), "attempt 2 allowed");
1860        assert!(
1861            limiter.check_key(&ip).is_err(),
1862            "attempt 3 must be blocked (explicit override of 2 wins over 10x default of 1000)"
1863        );
1864    }
1865
1866    /// End-to-end: the pre-auth gate must reject before the bearer-verification
1867    /// path runs. We exhaust the gate's quota (Some(1)) with one bad-bearer
1868    /// request, then the second request must be rejected with 429 + the
1869    /// `pre_auth_gate` failure counter incremented (NOT
1870    /// `failure_invalid_credential`, which would prove Argon2 ran).
1871    #[tokio::test]
1872    async fn pre_auth_gate_blocks_before_argon2_verification() {
1873        let (_token, hash) = generate_api_key().unwrap();
1874        let keys = vec![ApiKeyEntry {
1875            name: "test-key".into(),
1876            hash,
1877            role: "ops".into(),
1878            expires_at: None,
1879        }];
1880        let config = RateLimitConfig {
1881            max_attempts_per_minute: 100,
1882            pre_auth_max_per_minute: Some(1),
1883            ..Default::default()
1884        };
1885        let state = Arc::new(AuthState {
1886            api_keys: ArcSwap::new(Arc::new(keys)),
1887            rate_limiter: None,
1888            pre_auth_limiter: Some(build_pre_auth_limiter(&config)),
1889            #[cfg(feature = "oauth")]
1890            jwks_cache: None,
1891            seen_identities: Mutex::new(HashSet::new()),
1892            counters: AuthCounters::default(),
1893        });
1894        let app = auth_router(Arc::clone(&state));
1895        let peer: SocketAddr = "10.0.0.10:54321".parse().unwrap();
1896
1897        // First bad-bearer request: gate has quota, bearer verification runs,
1898        // returns 401 (invalid credential).
1899        let mut req1 = Request::builder()
1900            .method(axum::http::Method::POST)
1901            .uri("/mcp")
1902            .header("authorization", "Bearer obviously-not-a-real-token")
1903            .body(Body::empty())
1904            .unwrap();
1905        req1.extensions_mut().insert(ConnectInfo(peer));
1906        let resp1 = app.clone().oneshot(req1).await.unwrap();
1907        assert_eq!(
1908            resp1.status(),
1909            StatusCode::UNAUTHORIZED,
1910            "first attempt: gate has quota, falls through to bearer auth which fails with 401"
1911        );
1912
1913        // Second bad-bearer request from same IP: gate quota exhausted, must
1914        // reject with 429 BEFORE the Argon2 verification path runs.
1915        let mut req2 = Request::builder()
1916            .method(axum::http::Method::POST)
1917            .uri("/mcp")
1918            .header("authorization", "Bearer also-not-a-real-token")
1919            .body(Body::empty())
1920            .unwrap();
1921        req2.extensions_mut().insert(ConnectInfo(peer));
1922        let resp2 = app.oneshot(req2).await.unwrap();
1923        assert_eq!(
1924            resp2.status(),
1925            StatusCode::TOO_MANY_REQUESTS,
1926            "second attempt from same IP: pre-auth gate must reject with 429"
1927        );
1928
1929        let counters = state.counters_snapshot();
1930        assert_eq!(
1931            counters.failure_pre_auth_gate, 1,
1932            "exactly one request must have been rejected by the pre-auth gate"
1933        );
1934        // Critical: Argon2 verification must NOT have run on the gated request.
1935        // The first request's 401 increments `failure_invalid_credential` to 1;
1936        // the second (gated) request must NOT increment it further.
1937        assert_eq!(
1938            counters.failure_invalid_credential, 1,
1939            "bearer verification must run exactly once (only the un-gated first request)"
1940        );
1941    }
1942
1943    /// mTLS-authenticated requests must bypass the pre-auth gate entirely.
1944    /// The TLS handshake already performed expensive crypto with a verified
1945    /// peer, so mTLS callers should never be throttled by this gate.
1946    ///
1947    /// Setup: a pre-auth gate with quota 1 (very tight). Submit two mTLS
1948    /// requests in quick succession from the same IP. Both must succeed.
1949    #[tokio::test]
1950    async fn pre_auth_gate_does_not_throttle_mtls() {
1951        let config = RateLimitConfig {
1952            max_attempts_per_minute: 100,
1953            pre_auth_max_per_minute: Some(1), // tight: would block 2nd plain request
1954            ..Default::default()
1955        };
1956        let state = Arc::new(AuthState {
1957            api_keys: ArcSwap::new(Arc::new(vec![])),
1958            rate_limiter: None,
1959            pre_auth_limiter: Some(build_pre_auth_limiter(&config)),
1960            #[cfg(feature = "oauth")]
1961            jwks_cache: None,
1962            seen_identities: Mutex::new(HashSet::new()),
1963            counters: AuthCounters::default(),
1964        });
1965        let app = auth_router(Arc::clone(&state));
1966        let peer: SocketAddr = "10.0.0.20:54321".parse().unwrap();
1967        let identity = AuthIdentity {
1968            name: "cn=test-client".into(),
1969            role: "viewer".into(),
1970            method: AuthMethod::MtlsCertificate,
1971            raw_token: None,
1972            sub: None,
1973        };
1974        let tls_info = TlsConnInfo::new(peer, Some(identity));
1975
1976        for i in 0..3 {
1977            let mut req = Request::builder()
1978                .method(axum::http::Method::POST)
1979                .uri("/mcp")
1980                .body(Body::empty())
1981                .unwrap();
1982            req.extensions_mut().insert(ConnectInfo(tls_info.clone()));
1983            let resp = app.clone().oneshot(req).await.unwrap();
1984            assert_eq!(
1985                resp.status(),
1986                StatusCode::OK,
1987                "mTLS request {i} must succeed: pre-auth gate must not apply to mTLS callers"
1988            );
1989        }
1990
1991        let counters = state.counters_snapshot();
1992        assert_eq!(
1993            counters.failure_pre_auth_gate, 0,
1994            "pre-auth gate counter must remain at zero: mTLS bypasses the gate"
1995        );
1996        assert_eq!(
1997            counters.success_mtls, 3,
1998            "all three mTLS requests must have been counted as successful"
1999        );
2000    }
2001
2002    // -------------------------------------------------------------------
2003    // RFC 7235 §2.1 case-insensitive scheme parsing for `extract_bearer`.
2004    // -------------------------------------------------------------------
2005
2006    #[test]
2007    fn extract_bearer_accepts_canonical_case() {
2008        assert_eq!(extract_bearer("Bearer abc123"), Some("abc123"));
2009    }
2010
2011    #[test]
2012    fn extract_bearer_is_case_insensitive_per_rfc7235() {
2013        // RFC 7235 §2.1: "auth-scheme is case-insensitive".
2014        // Real-world clients (curl, browsers, custom HTTP libs) emit varied
2015        // casings; rejecting any of them is a spec violation.
2016        for header in &[
2017            "bearer abc123",
2018            "BEARER abc123",
2019            "BeArEr abc123",
2020            "bEaReR abc123",
2021        ] {
2022            assert_eq!(
2023                extract_bearer(header),
2024                Some("abc123"),
2025                "header {header:?} must parse as a Bearer token (RFC 7235 §2.1)"
2026            );
2027        }
2028    }
2029
2030    #[test]
2031    fn extract_bearer_rejects_other_schemes() {
2032        assert_eq!(extract_bearer("Basic dXNlcjpwYXNz"), None);
2033        assert_eq!(extract_bearer("Digest username=\"x\""), None);
2034        assert_eq!(extract_bearer("Token abc123"), None);
2035    }
2036
2037    #[test]
2038    fn extract_bearer_rejects_malformed() {
2039        // Empty string, no separator, scheme-only, scheme + only whitespace.
2040        assert_eq!(extract_bearer(""), None);
2041        assert_eq!(extract_bearer("Bearer"), None);
2042        assert_eq!(extract_bearer("Bearer "), None);
2043        assert_eq!(extract_bearer("Bearer    "), None);
2044    }
2045
2046    #[test]
2047    fn extract_bearer_tolerates_extra_separator_whitespace() {
2048        // Some non-conformant clients emit two spaces; we should still parse.
2049        assert_eq!(extract_bearer("Bearer  abc123"), Some("abc123"));
2050        assert_eq!(extract_bearer("Bearer   abc123"), Some("abc123"));
2051    }
2052
2053    // -------------------------------------------------------------------
2054    // Debug redaction: ensure `AuthIdentity` and `ApiKeyEntry` never leak
2055    // secret material via `format!("{:?}", …)` or `tracing::debug!(?…)`.
2056    // -------------------------------------------------------------------
2057
2058    #[test]
2059    fn auth_identity_debug_redacts_raw_token() {
2060        let id = AuthIdentity {
2061            name: "alice".into(),
2062            role: "admin".into(),
2063            method: AuthMethod::OAuthJwt,
2064            raw_token: Some(SecretString::from("super-secret-jwt-payload-xyz")),
2065            sub: Some("keycloak-uuid-2f3c8b".into()),
2066        };
2067        let dbg = format!("{id:?}");
2068
2069        // Plaintext fields must be visible (they are not secrets).
2070        assert!(dbg.contains("alice"), "name should be visible: {dbg}");
2071        assert!(dbg.contains("admin"), "role should be visible: {dbg}");
2072        assert!(dbg.contains("OAuthJwt"), "method should be visible: {dbg}");
2073
2074        // Secret fields must NOT leak.
2075        assert!(
2076            !dbg.contains("super-secret-jwt-payload-xyz"),
2077            "raw_token must be redacted in Debug output: {dbg}"
2078        );
2079        assert!(
2080            !dbg.contains("keycloak-uuid-2f3c8b"),
2081            "sub must be redacted in Debug output: {dbg}"
2082        );
2083        assert!(
2084            dbg.contains("<redacted>"),
2085            "redaction marker missing: {dbg}"
2086        );
2087    }
2088
2089    #[test]
2090    fn auth_identity_debug_marks_absent_secrets() {
2091        // For non-OAuth identities (mTLS / API key) the secret fields are
2092        // None; redacted Debug output should distinguish that from "present".
2093        let id = AuthIdentity {
2094            name: "viewer-key".into(),
2095            role: "viewer".into(),
2096            method: AuthMethod::BearerToken,
2097            raw_token: None,
2098            sub: None,
2099        };
2100        let dbg = format!("{id:?}");
2101        assert!(
2102            dbg.contains("<none>"),
2103            "absent secrets should be marked: {dbg}"
2104        );
2105        assert!(
2106            !dbg.contains("<redacted>"),
2107            "no <redacted> marker when secrets are absent: {dbg}"
2108        );
2109    }
2110
2111    #[test]
2112    fn api_key_entry_debug_redacts_hash() {
2113        let entry = ApiKeyEntry {
2114            name: "viewer-key".into(),
2115            // Realistic Argon2id PHC string (must NOT leak).
2116            hash: "$argon2id$v=19$m=19456,t=2,p=1$c2FsdHNhbHQ$h4sh3dPa55w0rd".into(),
2117            role: "viewer".into(),
2118            expires_at: Some(RfcTimestamp::parse("2030-01-01T00:00:00Z").unwrap()),
2119        };
2120        let dbg = format!("{entry:?}");
2121
2122        // Non-secret fields visible.
2123        assert!(dbg.contains("viewer-key"));
2124        assert!(dbg.contains("viewer"));
2125        assert!(dbg.contains("2030-01-01T00:00:00+00:00"));
2126
2127        // Hash material must NOT leak.
2128        assert!(
2129            !dbg.contains("$argon2id$"),
2130            "argon2 hash leaked into Debug output: {dbg}"
2131        );
2132        assert!(
2133            !dbg.contains("h4sh3dPa55w0rd"),
2134            "hash digest leaked into Debug output: {dbg}"
2135        );
2136        assert!(
2137            dbg.contains("<redacted>"),
2138            "redaction marker missing: {dbg}"
2139        );
2140    }
2141
2142    // -- AuthFailureClass exact-string contract tests --
2143    //
2144    // These tests pin the exact wire strings emitted for each failure
2145    // class. They exist to kill mutation-test mutants that replace the
2146    // match-arm string literals (e.g. with `""` or with the value from
2147    // another arm). Operators and dashboards rely on these literals
2148    // for metric labels and audit-log filters; any change is a
2149    // breaking observability change and must be reflected in
2150    // CHANGELOG.md.
2151
2152    #[test]
2153    fn auth_failure_class_as_str_exact_strings() {
2154        assert_eq!(
2155            AuthFailureClass::MissingCredential.as_str(),
2156            "missing_credential"
2157        );
2158        assert_eq!(
2159            AuthFailureClass::InvalidCredential.as_str(),
2160            "invalid_credential"
2161        );
2162        assert_eq!(
2163            AuthFailureClass::ExpiredCredential.as_str(),
2164            "expired_credential"
2165        );
2166        assert_eq!(AuthFailureClass::RateLimited.as_str(), "rate_limited");
2167        assert_eq!(AuthFailureClass::PreAuthGate.as_str(), "pre_auth_gate");
2168    }
2169
2170    #[test]
2171    fn auth_failure_class_response_body_exact_strings() {
2172        assert_eq!(
2173            AuthFailureClass::MissingCredential.response_body(),
2174            "unauthorized: missing credential"
2175        );
2176        assert_eq!(
2177            AuthFailureClass::InvalidCredential.response_body(),
2178            "unauthorized: invalid credential"
2179        );
2180        assert_eq!(
2181            AuthFailureClass::ExpiredCredential.response_body(),
2182            "unauthorized: expired credential"
2183        );
2184        assert_eq!(
2185            AuthFailureClass::RateLimited.response_body(),
2186            "rate limited"
2187        );
2188        assert_eq!(
2189            AuthFailureClass::PreAuthGate.response_body(),
2190            "rate limited (pre-auth)"
2191        );
2192    }
2193
2194    #[test]
2195    fn auth_failure_class_bearer_error_exact_strings() {
2196        assert_eq!(
2197            AuthFailureClass::MissingCredential.bearer_error(),
2198            (
2199                "invalid_request",
2200                "missing bearer token or mTLS client certificate"
2201            )
2202        );
2203        assert_eq!(
2204            AuthFailureClass::InvalidCredential.bearer_error(),
2205            ("invalid_token", "token is invalid")
2206        );
2207        assert_eq!(
2208            AuthFailureClass::ExpiredCredential.bearer_error(),
2209            ("invalid_token", "token is expired")
2210        );
2211        assert_eq!(
2212            AuthFailureClass::RateLimited.bearer_error(),
2213            ("invalid_request", "too many failed authentication attempts")
2214        );
2215        assert_eq!(
2216            AuthFailureClass::PreAuthGate.bearer_error(),
2217            (
2218                "invalid_request",
2219                "too many unauthenticated requests from this source"
2220            )
2221        );
2222    }
2223
2224    // -- AuthConfig::summary boolean-flag contract tests --
2225    //
2226    // These tests pin the boolean flags emitted by `AuthConfig::summary`
2227    // so that mutations like deleting `!` (which would invert the
2228    // semantics of `bearer`) or replacing `is_some()` with `is_none()`
2229    // are caught immediately. The summary is consumed by `/admin/*`
2230    // diagnostics so any inversion is an operator-visible regression.
2231
2232    #[test]
2233    fn auth_config_summary_bearer_true_when_keys_present() {
2234        let (_token, hash) = generate_api_key().unwrap();
2235        let cfg = AuthConfig::with_keys(vec![ApiKeyEntry::new("k", hash, "viewer")]);
2236        let s = cfg.summary();
2237        assert!(s.enabled, "summary.enabled must reflect AuthConfig.enabled");
2238        assert!(
2239            s.bearer,
2240            "summary.bearer must be true when api_keys is non-empty (kills `!` deletion at L615)"
2241        );
2242        assert!(!s.mtls, "summary.mtls must be false when mtls is None");
2243        assert!(!s.oauth, "summary.oauth must be false when oauth is None");
2244        assert_eq!(s.api_keys.len(), 1);
2245        assert_eq!(s.api_keys[0].name, "k");
2246        assert_eq!(s.api_keys[0].role, "viewer");
2247    }
2248
2249    #[test]
2250    fn auth_config_summary_bearer_false_when_no_keys() {
2251        let cfg = AuthConfig::with_keys(vec![]);
2252        let s = cfg.summary();
2253        assert!(
2254            !s.bearer,
2255            "summary.bearer must be false when api_keys is empty (kills `!` deletion at L615)"
2256        );
2257        assert!(s.api_keys.is_empty());
2258    }
2259}